Connectors and Data Loss Prevention Policies
This section describes the design decisions associated with restricting access of connectors within Power Platform for system(s) built using ASD's Blueprint for Secure Cloud.
Estimated reading time: 4 minutes
Power Apps and Power Automate are built with underlying connectors that enable applications to consume data from other services and define businesses process to act on this information. Power Apps and Power Automate connectors can be categorised as follows:
- Microsoft 365 and Office 365 connectors – These connectors provide data access to Microsoft 365 and Office 365 applications (e.g. SharePoint, Teams)
- Azure Services connectors – Azure services connectors provide Power Apps and Power Automate access to consume Azure Services (e.g. Azure Cosmos DB, Azure Computer Vision API)
- Third Party connectors – Third Party connectors enable external vendors to provide a service to Power Apps and Power Automate (e.g. Adobe Reader Sign)
- On-premises data connectors – On-premises data connectors enable Power Apps and Power Automate to consume data from a variety of sources such as SQL Server and SharePoint On-Premises
- Custom connectors – in a situation when a connector is not present, a custom connector can be created to connect to a service that has a REST API
Note
On-premises data connectors also require an on-premises data gateway.
Additional Power Apps and / or Power Automate plan licenses are required to use premium connectors, which includes all custom connectors, on-premises connectors, some Azure services, and third party connectors.
The following image shows consideration required for authentication process and requirements for each generalised group of connectors. The cloud services connector is required to be registered in Azure platform before it can be consumed in Power App and Power Automate. On-premises data access requires a service account for network access and a database service account access for Power Apps and Power Automate to consume its data.
See Microsoft documentation for additional information on Power Apps and Power Automate authentication and security.
Data Loss Prevention Policies Overview
Organisations can create Power Platform data loss prevention (DLP) policies to act as guardrails which helps prevent users from unintentionally exposing organisational data via connectors. DLP policies can be scoped at the environment level or tenant level, offering flexibility to craft sensible policies that strike the right balance between protection and productivity. For tenant-level policies organisations can define the scope to be all environments
, selected environments
, or all environments except ones specifically excluded
. Environment-level policies can be defined for one environment at a time.
DLP policies enforce rules for which connectors can be used together by classifying connectors as either Business
or Non-Business
grouping. Business group connectors can only be used with other connectors from that group in any given app or flow. Organisations may want to block the usage of certain connectors altogether by classifying them as Blocked
.
Design Decisions
Decision Point | Design Decision | Justification |
---|---|---|
On-Premises data sources | Not enabled | The Blueprint does not detail provisioning of an on-premises Data Gateway to support On-Premises data sources such as SQL Server or SharePoint On-Premises. |
Data Policies for Power Automate and Power Apps | Only selected standard Microsoft connectors to be enabled | Microsoft Premium connectors and third-party connectors will be disabled. The following connectors as will be enabled under the Business Group: SharePoint, OneDrive for Business, Office 365 Users, Planner, Outlook for 365, and Teams. The following additional connectors will also be enabled under the Business Group: Approvals, Excel, Excel Online, Notifications, OneNote (Business), Outlook Tasks, Power BI, Microsoft To-Do (Business), Power Apps Notification, Microsoft Planner. Note: a number of connectors such as Microsoft Dataverse and Yammer cannot be disabled so these will be moved to the Non-Business Group, thereby restricting their use alongside Business Group connectors. Organisations will need to evaluate additional requested connectors prior to enabling. |
Sharing with External Users | Disabled | Power Platform relies on Entra ID for authentication and therefore external sharing will be disabled at the Entra ID level. |
Environment Administrator | Access to Environment Administrator assigned to a security group for Power App and Power Automate | Security group should be used to be assigned as Environment Administrator for PowerApps and Power Automate. Environment Administrator will be able to create additional environments and configure the connector policies. |
Related information
Security & Governance
- None identified
Design
- None identified
Configuration
- None identified